Exchange 2010 Edge Transport Server STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 2
Comparison against the immediately-prior release (V1R10). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 2
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-334
- Vuln IDs
-
- V-33556
- Rule IDs
-
- SV-43976r1_rule
Checks: C-41662r1_chk
Open the Exchange Management Shell and enter the following command: Get-SenderIdConfig | Select Name, Identity, Enabled If the value of 'Enabled' is not set to 'True', this is a finding.
Fix: F-37448r1_fix
Open the Exchange Management Shell and enter the following command: Set-SenderIdConfig -Enable $true
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-336
- Vuln IDs
-
- V-33557
- Rule IDs
-
- SV-43977r1_rule
Checks: C-41663r1_chk
Open the Exchange Management Shell and enter the following command: Get-SenderFilterConfig | Select Enabled If the value of 'Enabled' is not set to 'True', this is a finding.
Fix: F-37449r1_fix
Open the Exchange Management Shell and enter the following command: Set-SenderfilterConfig -Enabled $true
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-339
- Vuln IDs
-
- V-33558
- Rule IDs
-
- SV-43978r1_rule
Checks: C-41664r2_chk
Open the Exchange Management Shell and enter the following command: Get-IPAllowListConfig | fl If the value for “Enabled” is set to “True” this is not a finding.
Fix: F-37450r1_fix
Open the Exchange Management Shell and enter the following command: Set-IPAllowListConfig -Enabled $true
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-342
- Vuln IDs
-
- V-33560
- Rule IDs
-
- SV-43980r1_rule
Checks: C-41666r1_chk
Access the EDSP and identify the SMTP ‘allow list’ settings. Open the Exchange Management Shell and enter the following command: Get-IPAllowListEntry | fl If the result returns any values, this is a finding. If the result returns any values, but has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-37452r1_fix
Open the Exchange Management Shell and noting identifiers from above, enter the following command: Remove-IPAllowListEntry -Identity <IP Allow List entry ID>
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-705
- Vuln IDs
-
- V-33561
- Rule IDs
-
- SV-43981r3_rule
Checks: C-41668r4_chk
Obtain the Email Domain Security Plan (EDSP) and locate the global maximum message receive size and if signoff with risk acceptance is documented for the receive connector to have a different value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, MaxMessageSize or Get-TransportConfig | Select Identity, MaxReceiveSize Identify Internet-facing connectors on the Edge Transport server. If 'MaxMessageSize' is set to a numeric value different from the global value, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of ‘MaxMessageSize' is not the same as the global value, this is a finding.
Fix: F-37453r3_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -MaxMessageSize <MaxReceiveSize> If an alternate value is desired from the global value MaxReceiveSize, obtain signoff with risk acceptance and document in the EDSP.
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-708
- Vuln IDs
-
- V-33563
- Rule IDs
-
- SV-43983r2_rule
Checks: C-41669r2_chk
Obtain the Email Domain Security Plan (EDSP) and locate the 'Maximum Inbound connections' value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, MaxInboundConnection Identify Internet-facing connectors on the Edge Transport server. If 'MaxInboundConnection' is set to a different numeric value or unlimited, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of 'MaxInboundConnection' is not set to 5000, this is a finding.
Fix: F-37455r1_fix
Noting the Internet-facing receive connector name, open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -MaxInboundConnection unlimited If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-710
- Vuln IDs
-
- V-33565
- Rule IDs
-
- SV-43985r1_rule
Checks: C-41671r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the 'Connection Timeout' value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, ConnectionTimeout If the value of 'ConnectionTimeout' is set to 00:05:00, this is not a finding. If 'ConnectionTimeout' is set to other than 00:05:00, and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-37457r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -ConnectionTimeout 00:05:00 or other value as identified by the Email Domain Security Plan.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-715
- Vuln IDs
-
- V-33566
- Rule IDs
-
- SV-43986r1_rule
Checks: C-41672r1_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, PermissionGroups If the value of 'PermissionGroups' is 'AnonymousUsers' for any non-internet connector, this is a finding.
Fix: F-37458r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -PermissionGroups and enter a valid value other than 'AnonymousUsers'.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-718
- Vuln IDs
-
- V-33567
- Rule IDs
-
- SV-43987r1_rule
Checks: C-41673r1_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, AuthMechanism If the value of 'AuthMechanism' is not set to 'Tls', this is a finding.
Fix: F-37459r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -AuthMechanism 'Tls'
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-721
- Vuln IDs
-
- V-33568
- Rule IDs
-
- SV-43988r1_rule
Checks: C-41674r1_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, DomainSecureEnabled If the value of 'DomainSecureEnabled' is not set to 'True', this is a finding.
Fix: F-40289r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -DomainSecureEnabled 'True'
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-724
- Vuln IDs
-
- V-33569
- Rule IDs
-
- SV-43989r1_rule
Checks: C-41675r1_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector -Identity <'ServerUnderReview\ReceiveConnector'> | Select AuthMechanism If the value of 'AuthMechanism' is not set to 'Tls, BasicAuth, BasicAuthRequireTLS', this is a finding.
Fix: F-37460r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -AuthMechanism 'Tls, BasicAuth, BasicAuthRequireTLS'
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-727
- Vuln IDs
-
- V-33572
- Rule IDs
-
- SV-43992r2_rule
Checks: C-41678r2_chk
Obtain the Email Domain Security Plan (EDSP) and locate the 'Maximum Recipients per Message' value: Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, MaxRecipientsPerMessage For each receive connector, evaluate the 'MaxRecipientsPerMessage' value. If the value of 'Maximum Recipients per Message' is set to a value other than 5000, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of 'MaxRecipientsPerMessage' is not set to 5000, this is a finding.
Fix: F-37463r2_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -MaxRecipientsPerMessage 5000 or other value as identified by the EDSP.
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-730
- Vuln IDs
-
- V-33574
- Rule IDs
-
- SV-43994r1_rule
Checks: C-41680r1_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, ChunkingEnabled If the value of 'ChunkingEnabled' is set to 'True', this is not a finding.
Fix: F-37465r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -ChunkingEnabled $true
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-733
- Vuln IDs
-
- V-33575
- Rule IDs
-
- SV-43995r1_rule
Checks: C-41681r1_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity Review the naming for connectors. If the connectors are not clearly named for purpose and direction, this is a finding.
Fix: F-37466r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Name <'NewName'> -Identity <'ReceiveConnector'>
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-736
- Vuln IDs
-
- V-33576
- Rule IDs
-
- SV-43996r2_rule
Checks: C-41682r6_chk
Non- Enterprise Mail Check Content: Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | select identity, AutoForwardEnabled If the value of 'AutoForwardEnabled' is not set to 'False', this is a finding. Enterprise Mail Check Content: If the value of 'AutoForwardEnabled' is set to 'True', this is not a finding. and In the Exchange Management Shell and enter the following command: Get-RemoteDomain If the value of 'RemoteDomain ' is not set to a ' .mil' and/or '.gov ' domain(s), this is a finding.
Fix: F-37467r3_fix
Non- Enterprise Mail Fix Text: Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'RemoteDomainName'> -AutoForwardEnabled $false Enterprise Mail Fix Text: New-RemoteDomain -Name <Descriptive Name> -DomainName <SMTP address space> Set-RemoteDomain -Identity <'RemoteDomainName'> -AutoForwardEnabled $true
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-739
- Vuln IDs
-
- V-33578
- Rule IDs
-
- SV-43998r1_rule
Checks: C-41683r1_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, TarpitInterval If the value of 'TarpitInterval' is not set to 00:00:05 or greater, this is a finding.
Fix: F-37469r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -TarpitInterval 00:00:05
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-741
- Vuln IDs
-
- V-33579
- Rule IDs
-
- SV-43999r2_rule
Checks: C-41685r3_chk
Obtain the Email Domain Security Plan (EDSP) and locate the value for 'Receive Connectors”. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select name, MaxHopCount If the value of 'MaxHopCount' is set to 60 this is not a finding. If the value of 'MaxHopCount' is set to a value other than 60 and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-37470r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -MaxHopCount 60 If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-743
- Vuln IDs
-
- V-33581
- Rule IDs
-
- SV-44001r1_rule
Checks: C-41687r1_chk
Open the Exchange Management Shell and enter the following command: Get-RecipientFilterConfig | Select Enabled If the value of 'Enabled' is not set to 'True', this is a finding.
Fix: F-37472r1_fix
Open the Exchange Management Shell and enter the following command: Set-RecipientFilterConfig -Enabled $true
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-751
- Vuln IDs
-
- V-33583
- Rule IDs
-
- SV-44004r1_rule
Checks: C-41689r1_chk
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity Review the naming for connectors. If the connectors are not clearly named for purpose and direction, this is a finding.
Fix: F-37474r1_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Name <'NewName'> -Identity <'SendConnector'>
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-754
- Vuln IDs
-
- V-33586
- Rule IDs
-
- SV-44006r1_rule
Checks: C-41691r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the value for 'Transient Failure Retry Count'. Open the Exchange Management Shell and enter the following command: Get-TransportServer -Identity <'ServerUnderReview'> | Select Name, Identity, TransientFailureRetryCount If the value of 'TransientFailureRetryCount' is set to 10 or less, this is not a finding. If the value of 'TransientFailureRetryCount' is set to more than 10, and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-37476r1_fix
Open the Exchange Management Shell and enter the following command: Set-TransportServer -Identity <'ServerUnderReview'> -TransientFailureRetryCount 10 or other value as identified by the EDSP.
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-757
- Vuln IDs
-
- V-33587
- Rule IDs
-
- SV-44007r3_rule
Checks: C-41694r5_chk
Obtain the Email Domain Security Plan (EDSP) and locate the global maximum message send size and if signoff with risk acceptance is documented for the receive connector to have a different value. Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Identity, MaxMessageSize or Get-TransportConfig | Select Identity, MaxSendSize If 'MaxMessageSize' is set to a numeric value different from the global value, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of ‘MaxMessageSize' is not the same as the global value, this is a finding.
Fix: F-37478r3_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'SendConnector'> -MaxMessageSize <MaxSendSize> If an alternate value is desired from the global value MaxSendSize, obtain signoff with risk acceptance and document in the EDSP.
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-760
- Vuln IDs
-
- V-33589
- Rule IDs
-
- SV-44009r1_rule
Checks: C-41695r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the value for 'SMTP Server Maximum Outbound Connections'. Open the Exchange Management Shell and enter the following command: Get-TransportServer -Identity <'ServerUnderReview'> | Select Name, Identity, MaxOutboundConnections If the value of 'MaxOutboundConnections' is set to 1000 this is not a finding. If the value of 'MaxOutboundConnections' is set to a value other than 1000 and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-37480r1_fix
Open the Exchange Management Shell and enter the following command: Set-TransportServer -Identity <'ServerUnderReview'> -MaxOutboundConnections 1000. If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-763
- Vuln IDs
-
- V-33590
- Rule IDs
-
- SV-44010r1_rule
Checks: C-41697r1_chk
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, DomainSecureEnabled If the value of 'DomainSecureEnabled' is not set to 'True', this is a finding.
Fix: F-37482r1_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector <'InternalSendConnector'> -DomainSecureEnabled $true
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-766
- Vuln IDs
-
- V-33592
- Rule IDs
-
- SV-44012r3_rule
Checks: C-41699r4_chk
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, TlsDomain If the value of 'TlsDomain' is not set to the value of the internal <'SMTP Domain'>, this is a finding.
Fix: F-37484r4_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'SendConnector'> -TlsDomain <'SMTP Domain'> <'SMTP Domain'> Note: 'SMTP Domain' is the internal SMTP domain within the organization.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-771
- Vuln IDs
-
- V-33594
- Rule IDs
-
- SV-44014r2_rule
Checks: C-41701r4_chk
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, SmartHosts Identify the Internet facing connectors. If the value of 'SmartHosts' does not return the Smart Host IP Address, this is a finding.
Fix: F-37486r1_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector <'SendConnector'> -SmartHosts <'IP Address of Smart Host'> -DNSRoutingEnabled $false
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-801
- Vuln IDs
-
- V-33596
- Rule IDs
-
- SV-44016r1_rule
Checks: C-41703r1_chk
Open the Exchange Management Shell and enter the following command: Get-TransportServer -Identity <'ServerUnderReview'> | Select Name, Identity, ConnectivityLogEnabled If the value of 'ConnectivityLogEnabled' is not set to 'True', this is a finding.
Fix: F-37488r1_fix
Open the Exchange Management Shell and enter the following command: Set-TransportServer -Identity <'ServerUnderReview'> -ConnectivityLogEnabled $true
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-805
- Vuln IDs
-
- V-33598
- Rule IDs
-
- SV-44018r1_rule
Checks: C-41705r1_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | select identity, DeliveryReportEnabled If the value of 'DeliveryReportEnabled' is not set to 'False', this is a finding.
Fix: F-37490r1_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'RemoteDomainName'> -DeliveryReportEnabled $false
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-808
- Vuln IDs
-
- V-33599
- Rule IDs
-
- SV-44019r1_rule
Checks: C-41706r2_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | select identity, NDREnabled If the value of 'NDREnabled' is not set to 'False', this is a finding.
Fix: F-37491r1_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'RemoteDomainName'> -NDREnabled $false
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-811
- Vuln IDs
-
- V-33601
- Rule IDs
-
- SV-44021r1_rule
Checks: C-41708r1_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain -Identity 'default' | Select Name, Identity, AllowedOOFType If the value of 'AllowedOOFType' is set to 'External' or 'ExternalLegacy', this is a finding.
Fix: F-37493r1_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -AllowedOOFType 'InternalLegacy' -Identity 'default'
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-814
- Vuln IDs
-
- V-33603
- Rule IDs
-
- SV-44023r1_rule
Checks: C-41711r2_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | select identity, AutoReplyEnabled If the value of 'AutoReplyEnabled' is not set to 'False', this is a finding.
Fix: F-37496r1_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'RemoteDomainName'> -AutoReplyEnabled $false
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-817
- Vuln IDs
-
- V-33606
- Rule IDs
-
- SV-44026r1_rule
Checks: C-41713r1_chk
Open the Exchange Management Shell and enter the following command: Get-EventLogLevel If any Diagnostic 'EventLevel' is not set to Lowest, this is a finding.
Fix: F-37498r1_fix
Open the Exchange Management Shell and enter the following command: Set-EventLogLevel -Identity <ServiceName\Name> -Level Lowest
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-820
- Vuln IDs
-
- V-33608
- Rule IDs
-
- SV-44028r2_rule
Checks: C-41715r3_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeServer –status | Select Name, Identity, ErrorReportingEnabled If the value of 'ErrorReportingEnabled' is not set to 'False', this is a finding.
Fix: F-37500r1_fix
Open the Exchange Management Shell and enter the following command: Set-ExchangeServer -Identity <'ServerName'> -ErrorReportingEnabled $false
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-826
- Vuln IDs
-
- V-33611
- Rule IDs
-
- SV-44031r1_rule
Checks: C-41718r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the authorized groups or users that should have access to the audit data. If any group or user has access to the audit data that is not documented in the EDSP, this is a finding.
Fix: F-37503r3_fix
Restrict any unauthorized groups or users from accessing the audit logs.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-828
- Vuln IDs
-
- V-33613
- Rule IDs
-
- SV-44033r1_rule
Checks: C-41720r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the authorized groups and users that have access to the Exchange application directories. Verify the access permissions on the directory match the access permissions listed in the EDSP. If any group or user has different access permissions, this is a finding. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V14.
Fix: F-37505r2_fix
Locate the Exchange application directory and Remove or modify the group or user access permissions. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V14.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-831
- Vuln IDs
-
- V-33616
- Rule IDs
-
- SV-44036r1_rule
Checks: C-41723r2_chk
Open the Exchange Management Shell and enter the following command: Get-OrganizationConfig If the value for CustomerFeedbackEnabled is not set to 'False', this is a finding.
Fix: F-37508r1_fix
Open the Exchange Management Shell and enter the following command: Set-OrganizationConfig -CustomerFeedbackEnabled $false
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-839
- Vuln IDs
-
- V-33618
- Rule IDs
-
- SV-44038r1_rule
Checks: C-41725r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the audit logs assigned partition. By default the logs are located on the application partition in '\Program Files\Microsoft\Exchange Server\V14\Logging\'. If the log files are not on a separate partition from the application, this is a finding.
Fix: F-37510r1_fix
Configure the audit log location to be on a partition drive separate from the application. Document the location in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-842
- Vuln IDs
-
- V-33619
- Rule IDs
-
- SV-44039r2_rule
Checks: C-41726r8_chk
Note: If a third party application is performing monitoring functions, the reviewer should verify the application is monitoring correctly and mark the vulnerability NA. Open the Exchange Management Shell and enter the following command: perfmon In the left pane, expand and navigate Data Collector Sets --> User Defined If no sets are defined or queues are not being monitored, this is a finding.
Fix: F-37511r5_fix
Open the Exchange Management Console In the left pane, navigate to and select Microsoft Exchange On-Premises <server.domain> --> Toolbox In the Right pane double click on Performance Monitor In the left pane, navigate to and select Performance Logs and Alerts --> Data Collector Sets --> User Defined Right click on User Defined and configure the system to use User Defined data collection for monitoring the queues.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-3-003
- Vuln IDs
-
- V-33620
- Rule IDs
-
- SV-44040r1_rule
Checks: C-41727r1_chk
Access the EDSP baseline section and determine the process and frequency for identifying software changes (*.exe, *.bat, *.com, *.cmd, and *.dll) on servers against a baseline. Examine artifacts identified as outputs of this process. If baseline comparisons are not done on the INFOCON-required schedule, this is a finding.
Fix: F-37512r1_fix
Implement a process to compare software against a baseline (*.exe, *.bat, *.com, *.cmd, and *.dll) on a frequency required by the prevailing INFOCON level. Document the process and output artifacts in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-3-006
- Vuln IDs
-
- V-33621
- Rule IDs
-
- SV-44041r1_rule
Checks: C-41728r1_chk
Access the EDSP and locate the baseline documentation. Review the application software baseline procedures and implementation artifacts. Note the list of files and directories included in the baseline procedure for completeness. If an email software copy exists to serve as a baseline and is available for comparison during scanning efforts, this is not a finding.
Fix: F-37513r1_fix
Implement email software baseline process. Document the details in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-005
- Vuln IDs
-
- V-33622
- Rule IDs
-
- SV-44042r1_rule
Checks: C-41729r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the 'Accepted Domain' values. Open the Exchange Management Shell and enter the following command: Get-AcceptedDomain If the value for 'AcceptedDomains' is not set to the value in the EDSP, this is a finding.
Fix: F-37514r1_fix
Open the Exchange Management Shell and enter the following command: Set-AcceptedDomain -Identity <'ValueInEDSP'> -MakeDefault $true
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-3-804
- Vuln IDs
-
- V-33623
- Rule IDs
-
- SV-44043r2_rule
Checks: C-41730r3_chk
To view system services open a windows power shell and enter the following command: Get-Service | Where-Object {$_.status -eq 'running'} The command returns a list of installed services and the status of that service. Required services will vary between organizations, and will vary depending on the role of the individual system. Organizations will develop their own list of services which will be documented and justified with the ISSO. The Site’s list will be provided for any security review. Services that are common to multiple systems can be addressed in one document. Exceptions for individual systems should be identified separately by system. If the site has not documented the services required for their system(s), this is a finding. If any undocumented or unnecessary services are running, then this is a finding.
Fix: F-37515r1_fix
Document the services required for the system to operate. Remove or disable any services that are not required.
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-011
- Vuln IDs
-
- V-33624
- Rule IDs
-
- SV-44044r1_rule
Checks: C-41731r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the global maximum message receive size. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select Identity, MaxReceiveSize If the value of 'MaxReceiveSize' is set to 10MB, this is not a finding. If the value of 'MaxReceiveSize' is set to an alternate value, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of 'MaxReceiveSize' is set to “Unlimited”, this is a finding.
Fix: F-37516r1_fix
Open the Exchange Management Shell and enter the following command: Set-TransportConfig -MaxReceiveSize 10MB If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-3-807
- Vuln IDs
-
- V-33625
- Rule IDs
-
- SV-44045r2_rule
Checks: C-41732r2_chk
Access Windows Explorer and identify the OS partition. Navigate to configured partitions, and access the ‘Program Files’ directory. Note the installation partition for Microsoft Exchange. If Exchange resides on a partition other than that of the OS, and does not have other applications installed (without associated approval from the ISSO), this is not a finding.
Fix: F-37517r1_fix
Install Exchange on a dedicated application partition separate than that of the OS.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-014
- Vuln IDs
-
- V-33626
- Rule IDs
-
- SV-44046r2_rule
Checks: C-41733r5_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeCertificate | Select CertificateDomains, issuer If the value of 'CertificateDomains' does not indicate it is issued by the DoD, this is a finding.
Fix: F-37518r1_fix
Remove the non-DoD certificate and import the correct DoD certificates.
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-015
- Vuln IDs
-
- V-33627
- Rule IDs
-
- SV-44047r2_rule
Checks: C-41735r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the global maximum message send size. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select Identity, MaxSendSize If the value of 'MaxSendSize' is set to 10MB, this is not a finding. If the value of 'MaxSendSize' is set to an alternate value, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of 'MaxSendSize' is set to “Unlimited”, this is a finding.
Fix: F-37519r1_fix
Open the Exchange Management Shell and enter the following command: Set-TransportConfig -MaxSendSize 10MB If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-3-814
- Vuln IDs
-
- V-33629
- Rule IDs
-
- SV-44049r3_rule
Checks: C-41737r5_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeServer | fl name, AdminDisplayVersion If the value of 'AdminDisplayVersion' does not return Version 14.2 (Build 247.5) or greater, this is a finding.
Fix: F-37521r3_fix
Update the system with the latest approved service pack or a supported release.
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-017
- Vuln IDs
-
- V-33630
- Rule IDs
-
- SV-44050r1_rule
Checks: C-41736r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the global maximum message recipient count. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select Identity, MaxRecipientEnvelopeLimit If the value of 'MaxRecipientEnvelopeLimit' is set to 5000, this is not a finding. If the value of 'MaxRecipientEnvelopeLimit' value is set to an alternate value, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of 'MaxRecipientEnvelopeLimit' is set to 'Unlimited', this is a finding.
Fix: F-37522r1_fix
Set-transportConfig -'MaxRecipientEnvelopeLimit' 5000 Restart the “Microsoft Exchange Information Store” service. If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-333
- Vuln IDs
-
- V-33631
- Rule IDs
-
- SV-44051r1_rule
Checks: C-41740r1_chk
Open the Exchange Management Shell and enter the following command: Get-SenderIdConfig | Select Name, Identity, SpoofedDomainAction If the value of 'SpoofedDomainAction' is not set to 'Reject', this is a finding.
Fix: F-37523r1_fix
Open the Exchange Management Shell and enter the following command: Set-SenderIdConfig -SpoofedDomainAction Reject
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-019
- Vuln IDs
-
- V-33632
- Rule IDs
-
- SV-44052r1_rule
Checks: C-41741r1_chk
Open the Exchange Management Shell and enter the following command: Get-ExecutionPolicy If the value of 'LocalMachine' does not return a value of 'RemoteSigned', this is a finding.
Fix: F-37524r2_fix
Open the Exchange Management Shell and enter the following command: Set-ExecutionPolicy RemoteSigned
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-330
- Vuln IDs
-
- V-33633
- Rule IDs
-
- SV-44053r2_rule
Checks: C-41742r2_chk
Access the EDSP for the name and information for the Block List provider. Open the Exchange Management Shell and enter the following command: Get-IPBlockListProvider | Select Name Identity LookupDomain If the values for Name, GUID and LookupDomain are configured, this is not a finding.
Fix: F-37525r2_fix
Open the Exchange Management Shell and enter the following command: Set-IPBlockListProvider -Name <Provider Name> [Additional optional parameters as required by the service provider] Document the configuration in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-200
- Vuln IDs
-
- V-33634
- Rule IDs
-
- SV-44054r1_rule
Checks: C-41743r1_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, Banner If the value of 'Banner' is not set to '220 SMTP Server Ready', this is a finding.
Fix: F-37526r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -Banner '220 SMTP Server Ready'
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-201
- Vuln IDs
-
- V-33635
- Rule IDs
-
- SV-44055r2_rule
Checks: C-41744r2_chk
Obtain the Email Domain Security Plan (EDSP) and locate the value for 'Maximum Domain Connections' and the server under review. Open the Exchange Management Shell and enter the following command: Get-TransportServer -Identity <'ServerUnderReview'> | Select Name, Identity, MaxPerDomainOutboundConnections If the value of 'MaxPerDomainOutboundConnections' is set to 20 this is not a finding. If the value of 'MaxPerDomainOutboundConnections' is set to a value other than 20 and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-37527r2_fix
Open the Exchange Management Shell and enter the following command: Set-TransportServer -Identity <'ServerUnderReview'> -MaxPerDomainOutboundConnections 20 If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-327
- Vuln IDs
-
- V-33636
- Rule IDs
-
- SV-44056r1_rule
Checks: C-41745r1_chk
Open the Exchange Management Shell and enter the following command: Get-ContentFilterConfig | Select Name, Identity, Enabled If the value of 'Enabled' is not set to 'True', this is a finding.
Fix: F-37528r1_fix
Open the Exchange Management Shell and enter the following command: Set-ContentFilterConfig -Enabled $true
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-302
- Vuln IDs
-
- V-33637
- Rule IDs
-
- SV-44057r1_rule
Checks: C-41746r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the list of undesirable attachment types that should be stripped. Open the Exchange Management Shell and enter the following command: Get-AttachmentFilterEntry If the values returned are different from the EDSP documented attachment types, this is a finding.
Fix: F-37529r1_fix
Open the Exchange Management Shell and enter the following command: Add-AttachmentFilterEntry -Name <'*.FileExtension'> -Type FileName
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-324
- Vuln IDs
-
- V-33638
- Rule IDs
-
- SV-44058r1_rule
Checks: C-41747r3_chk
Open the Exchange Management Shell and enter the following command: Get-SenderReputationConfig | Select SrlBlockThreshold If the value of 'SrlBlockThreshold' is not set to '6', this is a finding. If the value of 'SrlBlockThreshold' is set to a value other than 6 and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-37530r1_fix
Open the Exchange Management Shell and enter the following command: Set-SenderReputationConfig -SrlBlockThreshold 6. If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-321
- Vuln IDs
-
- V-33639
- Rule IDs
-
- SV-44059r1_rule
Checks: C-41749r1_chk
Open the Exchange Management Shell and enter the following command: Get-SenderReputationConfig | Select Enabled If the value of 'Enabled' is not set to 'True', this is a finding.
Fix: F-37532r1_fix
Open the Exchange Management Shell and enter the following command: Set-SenderReputationConfig -Enabled $true
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-305
- Vuln IDs
-
- V-33640
- Rule IDs
-
- SV-44060r1_rule
Checks: C-41750r2_chk
Open the Exchange Management Shell and enter the following command: Get-RecipientFilterConfig | Select RecipientValidationEnabled If the value of 'RecipientValidationEnabled' is not set to 'False', this is a finding.
Fix: F-37533r1_fix
Open the Exchange Management Shell and enter the following command: Set-RecipientFilterConfig -RecipientValidationEnabled $False
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-317
- Vuln IDs
-
- V-33641
- Rule IDs
-
- SV-44061r1_rule
Checks: C-41751r1_chk
Access the EDSP for the list of accepted domains for which this server accepts inbound email. Open the Exchange Management Shell and enter the following command: Get-SenderFilterConfig If the value for 'BlockedDomains' or 'BlockedDomainsAndSubdomains' does not reflect the list of accepted domains, this is a finding.
Fix: F-37534r1_fix
Open the Exchange Management Shell and enter the following command: Set-SenderFilterConfig -BlockedDomains <domain list> Or Set-SenderFilterConfig -BlockedDomainsAndSubdomains <domain list> Enter the list of accepted domains for this email system. Document the configuration in the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-308
- Vuln IDs
-
- V-33642
- Rule IDs
-
- SV-44062r1_rule
Checks: C-41752r1_chk
Open the Exchange Management Shell and enter the following command: Get-ContentFilterConfig | Select QuarantineMailbox If no SMTP address is assigned to 'QuarantineMailbox', this is a finding.
Fix: F-37535r1_fix
Open the Exchange Management Shell and enter the following command: Set-ContentFilterConfig -QuarantineMailbox <'SmtpAddressOfMailbox'>
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-314
- Vuln IDs
-
- V-33643
- Rule IDs
-
- SV-44063r1_rule
Checks: C-41753r1_chk
Open the Exchange Management Shell and enter the following command: Get-SenderFilterConfig | Select BlankSenderBlockingEnabled If the value of 'BlankSenderBlockingEnabled' is not set to 'True', this is a finding.
Fix: F-37536r1_fix
Open the Exchange Management Shell and enter the following command: Set-SenderFilterConfig -BlankSenderBlockingEnabled $true
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-311
- Vuln IDs
-
- V-33644
- Rule IDs
-
- SV-44064r1_rule
Checks: C-41754r1_chk
Open the Exchange Management Shell and enter the following command: Get-SenderFilterConfig | Select Action If the value of 'Action ' is not set to 'Reject', this is a finding.
Fix: F-37537r1_fix
Open the Exchange Management Shell and enter the following command: Set-SenderFilterConfig -Action Reject
- RMF Control
- Severity
- L
- CCI
- Version
- Exch-2-769
- Vuln IDs
-
- V-33646
- Rule IDs
-
- SV-44066r1_rule
Checks: C-41756r1_chk
Obtain the Email Domain Security Plan (EDSP) and locate the 'Connection Timeout' value. Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, ConnectionInactivityTimeOut If the value of 'ConnectionInactivityTimeOut' is set to 00:10:00, this is not a finding. If 'ConnectionInactivityTimeOut' is set to other than 00:10:00, and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-37539r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -ConnectionInactivityTimeOut 00:10:00 or other value as identified by the EDSP.
- RMF Control
- Severity
- M
- CCI
- Version
- Exch-2-768
- Vuln IDs
-
- V-60981
- Rule IDs
-
- SV-75445r1_rule
Checks: C-61913r2_chk
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, TlsAuthLevel If the value of 'TlsAuthLevel' is not set to 'DomainValidation, this is a finding.
Fix: F-66713r1_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'SendConnector'> -TlsAuthLevel DomainValidation